Trademarks owned by Telos Corporation | Applied Marks - Trademark, Domain Name and Social Media Protection for Brands - /\\\ Applied Marks
owned Telos Corporation owned Telos Corporation

Trademarks owned by 'Telos Corporation'

Summary of page content
2013-02-07
4539177
2014-05-27
US
  • 37
    Building construction; repair; installation services
    consulting in the field of maintenance and repair of communications and data network hardware, apparatus, and instruments for providing layered routing encryption, point to point encryption, and end to end encryption
710
CANCELLED - SECTION 8
2021-01-01
2021-02-09
systems protection car air services warrior vehicles mobile data nevamar rna shield zombie dunbar secure security federal express lenco strike
2013-02-07
4539179
2014-05-27
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer security consulting in the field of providing layered routing encryption, point to point encryption, and end to end encryption services to others; testing of computers and networks of others to assess information security vulnerability; and customizing software for others to provide layered routing encryption, point to point encryption, and end to end encryption services
710
CANCELLED - SECTION 8
2021-01-01
2021-02-09
systems protection car air services warrior vehicles mobile data nevamar rna shield zombie dunbar secure security federal express lenco strike
2013-08-22
4532637
2014-05-20
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software, namely, application framework software used in the development of software applications; computer application framework software that is touch-optimized for various hardware, software and mobile platforms and has interoperability with existing and legacy systems, namely, software for providing access to real-time or near real-time information with secure communication and data sharing
710
CANCELLED - SECTION 8
2020-12-25
2021-02-02
adventure g7 game hotel triple young 90 systems modular alternative health channel bible church concierge discovery games mind body spirit
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines positioned to the left of the words "XACTA.IO".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines positioned above the words "XACTA.IO".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines positioned to the left of the words "XACTA.IO".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-06-15
US
Trademark Image
The mark consists of a set of three stacked curved broken lines next to a mirror image set of three stacked curved broken lines positioned above the words "XACTA.IO".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets and cloud resources; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets through integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
733
FOURTH EXTENSION - GRANTED
2021-01-29
2021-02-02
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2018-01-26
5927289
2019-12-03
US
Trademark Image
The mark consists of the word "TELOS" with the word "GHOST" underneath of it, with a black and white shield, one half of the shield being all black and the other half having a black and white connecting triangle design, all on the left side of the words "TELOS GHOST".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and computer software for user identity and authentication, secure network access, secure network communications, information assurance and network integrity, all in the field of cybersecurity
  • 38
    Telecommunications
    computer network security services, namely, secure network communications in the nature of providing private and secure real time electronic communication over a computer network for the purposes of mitigating cybersecurity risks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer network security services, namely, providing secure network access in the nature of restricting and controlling access privileges of users of computing resources based on assigned credentials for the purposes of mitigating cybersecurity risks; computer network security services, namely, providing user identity and authentication services using two-factor authentication of personal identification information and transmitting such information via the internet all for the purposes of mitigating cybersecurity risks; computer network security services, namely, assurance and network integrity capabilities in the nature of providing computer security assurance and administration of digital keys and digital certificates for the purposes of mitigating cybersecurity risks
700
REGISTERED
2019-12-03
2020-12-09
international health 90 systems modular alternative channel bible church concierge discovery games mind body spirit tv venture partners wealth management
2017-05-18
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer software that provides mobile identity management, verification and authorization using biometric data; computer software for use in the identification and authentication of individuals based on their unique biometric characteristics; computer software platform for use in the identification and authentication of individuals based on their unique biometric characteristics; computer software used for managing biometric queries received from biometric sensors and/or readers
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer project management services and consulting services in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; providing an on-line computer database in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; computer programming services for others in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; computer program design, development and maintenance of computer programs services in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields
606
ABANDONED - NO STATEMENT OF USE FILED
2019-03-25
2020-12-09
systems compliance playbook issues central ecce iq saint marys college california 1863 bio environmental pelikan pharmaceuticals plastics pro says communication
2017-05-18
US
S
Trademark Image
The mark consists of a stylized "S" surrounded by a single line circle.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    downloadable computer software that provides mobile identity management, verification and authorization using biometric data; computer software for use in the identification and authentication of individuals based on their unique biometric characteristics; computer software platform for use in the identification and authentication of individuals based on their unique biometric characteristics; computer software used for managing biometric queries received from biometric sensors and/or readers
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer project management services and consulting services in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; providing an on-line computer database in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; computer programming services for others in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields; computer program design, development and maintenance of computer programs services in the field of biometric recognition for the computer, server, e-commerce, security, and identification fields
606
ABANDONED - NO STATEMENT OF USE FILED
2019-03-25
2020-12-09
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2017-06-19
5515206
2018-07-10
US
Trademark Image
The mark consists of a canted crescent design with the open portion facing to the left and the word "XACTA" stacked above the number "360" to the right of the canted crescent design.
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software and downloadable computer software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; computer software and downloadable computer software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; computer software and downloadable computer software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets, through the integration into a security tools architecture; computer software and downloadable computer software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; providing temporary use of non-downloadable software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets, through the integration into a security tools architecture; providing temporary use of non-downloadable software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; software as a service (saas) services featuring software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; software as a service (saas) services featuring software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; software as a service (saas) services featuring software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets, through the integration into a security tools architecture; software as a service (saas) services featuring software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
700
REGISTERED
2018-07-10
2020-12-09
systems health management network degree degrees ° system global athletics academy leadership business performance reading feedback view development perspective plus
2016-09-20
US
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable cloud-based software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; providing temporary use of non-downloadable cloud-based software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable cloud-based software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets, through the integration into a security tools architecture; providing temporary use of non-downloadable cloud-based software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
606
ABANDONED - NO STATEMENT OF USE FILED
2017-12-18
2020-12-09
systems nine computing white sleeping soft security storage black little red life sealy silver campaign solutions comfort services florida center
2016-11-28
US
Trademark Image
The mark consists of a stylized cloud outline partially encircling a stylized "X", which is above the number "360".
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    providing temporary use of non-downloadable cloud-based software for information technology (it) asset management, namely, cataloging and managing of it physical and logical business assets; providing temporary use of non-downloadable cloud-based software for it risk management, namely, assessing and managing it risks in context of the business, and presenting risk exposure thereto; providing temporary use of non-downloadable cloud-based software for it vulnerability management, namely, detecting and remediating vulnerabilities and related threats across physical and logical it assets, through the integration into a security tools architecture; providing temporary use of non-downloadable cloud-based software for it control management, namely, documenting, assessing, and providing an evidence trail of it controls and compliance with standards and regulations; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security
606
ABANDONED - NO STATEMENT OF USE FILED
2018-01-01
2020-12-09
systems health management network degree degrees ° system global athletics academy leadership business performance reading feedback view development perspective plus
2016-01-12
5210280
2017-05-23
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for security certification and accreditation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis and security risk assessment and security process automation, data management and data integration; all in the fields of information assurance, information security, cyber security, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; e-commerce software to allow users to perform business transactions via a global computer network; computer software for others engaged in e-commerce, namely, process automation and service management, system and network health monitoring, automated job scheduling and notification, remote monitoring of systems and workstations, automated delivery of software, automated hardware and software inventory, to address change/problem management and service level agreements, integrated management of physical hardware and network assets; computer software to allow users to engage in e-commerce, namely, security certification and accreditation support, security policy and operational procedure development, security architecture design and implementation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis and security risk assessment
700
REGISTERED
2017-05-23
2020-12-09
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
2014-08-28
5195976
2017-05-02
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer hardware and computer software for user identity and authentication, secure network access, secure network communications, information assurance and network integrity, all in the field of cybersecurity
  • 38
    Telecommunications
    computer network security services, namely, secure network communications in the nature of providing private and secure real time electronic communication over a computer network for the purposes of mitigating cybersecurity risks
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    computer network security services, namely, providing secure network access in the nature of restricting and controlling access privileges of users of computing resources based on assigned credentials for the purposes of mitigating cybersecurity risks
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    computer network security services, namely, providing user identity and authentication services in the nature of providing authentication of personal identification information via secure storage and transmitting such information via the internet all for the purposes of mitigating cybersecurity risks; computer network security services, namely, assurance and network integrity capabilities in the nature of providing computer security assurance and administration of digital keys and digital certificates for the purposes of mitigating cybersecurity risks
700
REGISTERED
2017-05-02
2020-12-09
international health 90 systems modular alternative channel bible church concierge discovery games mind body spirit tv venture partners wealth management
2014-10-08
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for comprehensive visualization and presentation of data associated with the cyber domain, for enhanced collaboration in a multi-user environment, for integration with disparate data sources, and for custom development and design; all of the foregoing software is touch-optimized for various hardware, software and mobile platforms, is interoperable with existing and legacy systems, provides access to real-time or near real-time information, and provides secure communication and data sharing
606
ABANDONED - NO STATEMENT OF USE FILED
2016-11-14
2020-05-31
adventure g7 game hotel triple young network scanner server software sting 90 systems modular alternative health channel bible church concierge
2014-03-25
4857579
2015-11-24
US
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for security certification and accreditation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis and security risk assessment and security process automation, data management and data integration; all in the fields of information assurance, information security, cybersecurity, operational security, computer network data analytics, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and organizational enterprise risk management relating to network security, communication security and data security; e-commerce software to allow users to perform business transactions via a global computer network; computer software for others engaged in e-commerce, namely, process automation and service management, system and network health monitoring, automated job scheduling and notification, remote monitoring of systems and workstations, automated delivery of software, automated hardware and software inventory, to address change/problem management and service level agreements, integrated management of physical hardware and network assets; computer software to allow users to engage in e-commerce, namely, security certification and accreditation support, security policy and operational procedure development, security architecture design and implementation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis and security risk assessment
700
REGISTERED
2015-11-24
2020-12-09
management health care life solutions marketing services covering lifes twists turns learning insurance storage across family healthcare communications performance aesthetic
2013-06-11
5066643
2016-10-25
US
Trademark Image
The mark consists of a stylized "T" in a diamond shape with the wording "TELOS".
  • 9
    Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
    computer software for security certification and accreditation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis, and security risk assessment and security process automation; computer hardware and peripherals; portable computers; computer workstations comprising computer hardware; computer networking products, namely, computer servers, peripherals and computer software for data communication between application programs, data management and data integration; e-commerce software to allow users to perform business transactions via a global computer network; computer software for others engaged in e-commerce, namely, software for business process automation and service management, system and network health monitoring, automated employee job scheduling and notification, remote monitoring of systems and workstations, automated delivery of software, automated scanning and monitoring of hardware and software inventory assets, and inventory management of physical hardware and network assets; computer software to allow users to engage in e-commerce, namely, software for providing security certification and accreditation support, and software for security policy and operational procedure development; computer software for administration of computer networks, namely, software for automated cross-platform data backup and recovery, and cross-platform user administration from a single computer console; software for computer systems security architecture design and implementation, computer network security testing and evaluation, computer systems vulnerability analysis and rectification, malicious code analysis, and computer network security risk assessment; computer software to allow users to visually represent and manipulate data sets in a touch optimized environment; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
  • 37
    Building construction; repair; installation services
    computer hardware maintenance services for others
  • 38
    Telecommunications
    telecommunications services, the providing of connections to existing information technology utilizing wired and wireless technology, namely, the electronic transmission of voice, video, data, facsimile, electronic messages, mail and live video conversations, conferencing and communications and information through personal computers, the global computer network, devices interfacing with local and wide area networks, and consulting services concerning data communications and network access, all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
  • 42
    Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
    information technology services, namely, computer consulting services in the fields of computer security, computer network security, and electronic data security; development, design, integration and installation of computer software, computer systems and networks; computer systems analysis; testing, analysis and evaluation of information technology systems and networks of others for the purposes of enabling organizations to make risk-based security authorization decisions and ensuring that such systems and networks comply with government and industry standards; computer software design for others; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
  • 45
    Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
    consulting services concerning the management of user identity and access to a computer network in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
700
REGISTERED
2016-10-25
2020-12-09
systems international health management network 90 modular alternative channel bible church concierge discovery games mind body spirit tv venture partners
First 1 2 Last  1 of 2
NEED HELP? Chat with us online

Copyright 2008 - 2024 Applied Marks Pty Ltd (ACN 134 698 249). All rights reserved. Terms of Service, Privacy Policy and Acceptable Use Policy.